Author:
Jha Sadhana,Sural Shamik,Atluri Vijayalakshmi,Vaidya Jaideep
Publisher
Springer International Publishing
Reference19 articles.
1. Cormen, T.H.: Introduction to Algorithms. MIT press, Cambridge (2009)
2. Xu, Z., Stoller, S.D.: Mining attribute-based access control policies. In: IEEE Transactions on Dependable and Secure Computing (2015)
3. Lecture Notes in Computer Science;E Medvet,2015
4. Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandhu, R., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication (2014)
5. Nurmamat, H., Rahman, K.: Attribute based access control constraint based on subject similarity. In: Proceedings of the IEEE Workshop on Advanced Research and Technology in Industry Applications, pp. 226–229 (2014)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献